Skip to content
  • Blog Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form

Phishers Abuse SharePoint in New Campaign Targeting Energy Sector

Posted on January 23, 2026January 23, 2026 By CWS

Menace actors have been abusing SharePoint for payload supply in a brand new phishing marketing campaign concentrating on power organizations, Microsoft warns.

One multi‑stage assault analyzed by Microsoft began with adversary‑in‑the‑center (AitM) phishing, the place the sufferer obtained an electronic mail from the compromised account of a trusted group.

The message featured a doc‑sharing workflow theme and included a SharePoint URL that directed the sufferer to a touchdown web page prompting them for his or her Microsoft credentials.

Subsequent, the attackers arrange for enterprise electronic mail compromise (BEC), accessing the compromised inbox and creating guidelines to mark all messages as learn and delete incoming emails. They then despatched over 600 phishing emails to the sufferer’s contacts, with one other phishing URL.

“The recipients had been recognized based mostly on the current electronic mail threads within the compromised consumer’s inbox,” Microsoft explains.

The attackers monitored the compromised account, deleting undelivered and out-of-office responses, in addition to messages from recipients who questioned the authenticity of the phishing emails.Commercial. Scroll to proceed studying.

“The emails and responses had been then deleted from the mailbox. These strategies are widespread in any BEC assaults and are supposed to maintain the sufferer unaware of the attacker’s operations, thus serving to in persistence,” Microsoft explains.

The attackers mounted one other AitM assault in opposition to the recipients from inside the group who clicked on the phishing URL, the corporate notes.

To guard themselves from such assaults, organizations are suggested to implement multi-factor authentication (MFA) and allow conditional entry insurance policies in Microsoft Entra.

Nonetheless, as a result of AitM assaults consequence within the compromise of sign-in classes, remediation requires not solely resetting the compromised customers’ passwords but additionally revoking the classes and verifying that MFA has not been tampered with.

“Whereas AiTM phishing makes an attempt to avoid MFA, implementation of MFA stays a necessary pillar in identification safety and extremely efficient at stopping all kinds of threats. MFA is the rationale that risk actors developed the AiTM session cookie theft approach within the first place,” Microsoft notes.

Implementing steady entry analysis, passwordless sign-in, enabling networking safety in endpoint safety options, implementing safety options on cellular gadgets, and utilizing browsers that mechanically establish and block malicious web sites additionally assist mitigate the danger related to these assaults.

Associated: LastPass Customers Focused With Backup-Themed Phishing Emails

Associated: FBI: North Korean Spear-Phishing Assaults Use Malicious QR Codes

Associated: Advanced Routing, Misconfigurations Exploited for Area Spoofing in Phishing Assaults

Associated: AI Is Supercharging Phishing: Right here’s The way to Combat Again

Security Week News Tags:Abuse, Campaign, Energy, Phishers, Sector, SharePoint, Targeting

Post navigation

Previous Post: New Phishing Kit As-a-service Attacking Google, Microsoft, and Okta Users
Next Post: Fortinet Confirms FortiCloud SSO Exploitation Against Patched Devices

Related Posts

Infostealer Malware Delivered in EmEditor Supply Chain Attack Security Week News
Salesforce AI Hack Enabled CRM Data Theft Security Week News
Gene Sequencing Giant Illumina Settles for $9.8M Over Product Vulnerabilities Security Week News
How Scammers Are Using AI to Steal College Financial Aid Security Week News
Russian APT Exploiting Mail Servers Against Government, Defense Organizations Security Week News
Hackers Stole 300,000 Crash Reports From Texas Department of Transportation Security Week News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Top 10 Best Data Security Companies in 2026
  • Fortinet Confirms FortiCloud SSO Exploitation Against Patched Devices
  • Phishers Abuse SharePoint in New Campaign Targeting Energy Sector
  • New Phishing Kit As-a-service Attacking Google, Microsoft, and Okta Users
  • Fortinet Confirms Active FortiCloud SSO Bypass on Fully Patched FortiGate Firewalls

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Top 10 Best Data Security Companies in 2026
  • Fortinet Confirms FortiCloud SSO Exploitation Against Patched Devices
  • Phishers Abuse SharePoint in New Campaign Targeting Energy Sector
  • New Phishing Kit As-a-service Attacking Google, Microsoft, and Okta Users
  • Fortinet Confirms Active FortiCloud SSO Bypass on Fully Patched FortiGate Firewalls

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Copyright © 2026 Cyber Web Spider Blog – News.

Powered by PressBook Masonry Dark